Sciweavers

359 search results - page 40 / 72
» Supporting Real World Security Models in Java
Sort
View
126
Voted
CAISE
2004
Springer
15 years 8 months ago
Office Activity Procedure Exception Handling Realization Difficulties
Office activity procedure automation is getting very popular in major organizations. During the automation then workflow method is chosen frequently, because of its possibility to ...
Dovile Vojevodina, Genadijus Kulvietis
118
Voted
EUROCRYPT
2007
Springer
15 years 8 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz
95
Voted
ADVIS
2004
Springer
15 years 6 months ago
Temporality in Databases
Research in temporal database management has suggested that the Entity-Relationship (E-R) model lacks appropriate constructs for representing the dynamic nature of the real world....
Abdullah Uz Tansel
116
Voted
WORM
2003
15 years 4 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
132
Voted
RTCSA
2005
IEEE
15 years 8 months ago
Research Issues in the Development of Context-Aware Middleware Architectures
Context-aware middleware encompasses uniform ions and reliable services for common operations, supports for most of the tasks involved in dealing with context, and thus simplifyin...
Hung Quoc Ngo, Anjum Shehzad, Kim Anh Pham Ngoc, S...